TOOLS TO CREATE TROJANS!!!

TOOLS TO CREATE TROJANS!!!

What is Trojan Horses?
"This is malware which does not replicate itself".

Why it is named as Trojan Horse?

This name is based on the mythological story of a GREEK WARRIOR who hides inside a giant wooden horse which was present in the city of Troy.
After dark, he opened the previously impenetrable gate of Troy city to let his rest of the army and sack the city.

The same happens with this Trojan horse virus it hides inside another software.




Here are some tools to create Trojans!

Trojans are used to take control of the victim's system. There is a wide range of tool some are mentioned below...

RECUB :
Remote Encrypted Callback Unix Backdoor, is a handy admin tool which can be also used as a backdoor on a Linux system. Some of its features make it unique to other backdoors.

AMITIS :
This trojan will compress files in victims pc and then download them, convert pictures in victims computer.

BEAST :
Windows-based backdoor trojan horse, commonly known as “RAT” or Remote Administration Tool.

HARD DISK KILLER :
The virus encrypts the disk by alternately XORing sectors with 0AAAAh and 05555h, effectively destroying the information on the disk.

RAT :
Remote Access Trojan is a malware which remotely takes access of your system.

Comments

Popular posts from this blog

CAREER TECHNOLOGY CYBER SECURITY INDIA PVT LTD.

Some Dark web Links

Cyber Security Audits